First published: Fri Jun 01 2018(Updated: )
Kernel. A buffer overflow was addressed with improved bounds checking.
Credit: Ian Beer Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS High Sierra | <10.13.5 | 10.13.5 |
macOS High Sierra | ||
Apple El Capitan | ||
Apple TV | <11.4 | |
iStyle @cosme iPhone OS | <11.4 | |
Apple iOS and macOS | <10.13.5 | |
Apple iOS, iPadOS, and watchOS | <4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2018-4241 is critical, with a severity value of 7.8.
iOS before 11.4, macOS before 10.13.5, tvOS before 11.4, and watchOS before 4.3.1 are affected by CVE-2018-4241.
The component involved in CVE-2018-4241 is the 'Kernel'.
CVE-2018-4241 is a buffer overflow vulnerability in the mptcp_usr_connectx function, which allows attackers to execute arbitrary code.
To fix CVE-2018-4241, update your iOS to version 11.4 or later, update your macOS to version 10.13.5 or later, update your tvOS to version 11.4 or later, and update your watchOS to version 4.3.1 or later.